Sysdig Now Detects Shellshock Intrusions For Fun And Profit

The folks at Sysdig have your back, sysadmins. The founder, Loris Degioanni, has posted an update to his open source system monitor that can look for Shellshock attacks in real time. Because the HTTP requests used by Shellshock exploits are quite unique, the monitor can watch for attacks on the bash shell automatically and let you know when hackers are trying to get in.

Using sysdig to capture all the bash executions is trivial, but in order to make things even easier, we spent a couple hours today putting together a new sysdig release that contains a new chisel called shellshock_detect. The chisel captures all the bash executions for which the environment variables match the Shellshock signature, and for each of them it prints

The time
The victim process’ name and pid (ie. the process that has been attacked with the malicious payload and that will execute bash)
The injected function (i.e. what bash is going to execute)

The resulting output, created by a tool they call a chisel, is pretty jarring if you’re being attacked. For example, you could see stuff like this: